Infrastructure Security · IS-Q15B

Bonus Question: Are intrusion detection and prevention systems (IDS/IPS) deployed and tuned for critical network segments?

Why This Matters

IDS/IPS technologies detect attacks that bypass perimeter firewalls and provide essential visibility into network threats and policy violations.

Maturity

0 — Unaware
No intrusion detection or prevention systems deployed.
1 — Ad Hoc
IDS/IPS exists but alerts unmonitored.
2 — Defined
Critical segments monitored with signature updates.
3 — Managed
Alerts triaged by SOC; false positives tracked.
4 — Integrated
Detection integrated with SIEM and incident response.
5 — Optimized
Adaptive detection with threat intelligence correlation.

How to Level Up

| From → To | Actions | |—|—| | 0 → 1 |Deploy basic IDS on perimeter.| | 1 → 2 |Enable signature updates and alert logging.| | 2 → 3 |Create triage SOP and feedback loop.| | 3 → 4 |Integrate with SIEM and IR workflows.| | 4 → 5 |Incorporate external threat feeds for tuning.|

Enablers

Evidence

KPIs

Low-Cost / Open-Source Options (MSME)

| Purpose | Tool | Notes | |—|—|—| | IDS/IPS | Suricata / Snort | Signature-based detection | | Visibility | Zeek | Deep traffic analysis | | Dashboard | Wazuh / ELK | Correlation and alerting |

Common Pitfalls

Compliance Mapping

| Standard | Clauses / Notes | |—|—| | ISO/IEC 27001 | A.8.16 / A.8.23 | | CERT-In 2022 | Section 15 | | NIST CSF 2.0 | DE.CM / PR.PT | | NIRMATA Mapping | IS-Q15B extends Infrastructure Security with proactive network threat detection. |